Question
In the following question, a sentence is divided in to
three parts, given in column 1, 2 and 3. Match the statements from column 1 with those in column 2 and 3 and find which of the following triplets given in the options make contextually and grammatically correct sense. In the following question, a sentence is divided in to three parts, given in column 1, 2 and 3. Match the statements from column 1 with those in column 2 and 3 and find which of the following triplets given in the options make contextually and grammatically correct sense.Solution
The correctly matched triplets are AFH, BDG and CEI. AFH: A talks about a time prior to the 24/7 social media and F carries it forward by stating that kids used to spend time on 'online discussion forums' discussing 'shared interests'. H completes this idea by stating that the 'shared interests' included 'films', 'music' or 'sport'. BDG: B talks about 'bank'. Amongst D, E and F, only D can carry the phrase introduced in B forward; the noun 'bank' is carried forward by the verb phrase 'to have to step in'. G carries this idea forward and concludes that it is not a good idea for bank to 'rescue another bank'. CEI: C introduces the water repellent surface of a lotus leaf; 'the fact that a water droplet rolls down its surface. E carries this forward and says that this inspired 'chemical engineers'. Further, E ends with the adjective 'hydrophobic' and must be followed by a noun. I satisfies the grammatical condition mentioned above and carries the idea expressed in C and E forward. Amongst these, only CEI is mentioned in the given options. The other triplets are incorrectly matched. Hence, d) is the correct answer.
What does HTML stand for in web technology?
Which layer of the OSI model provides flow control, error checking, and reliability in data transmission?
In C programming, which header file is commonly used to work with DMA?
What is the data transmission direction in a Token Ring network?
Store data in single table
State true/false
Once the email is compromised, all other sites and services online associated with this email can be compromised.
Which of the following backup types provides the fastest backup and recovery performance but requires the most storage space?
What is the purpose of a semaphore in synchronization?
In which programming language is dynamic memory allocation commonly used?
What does the term "phishing" refer to in the context of cybersecurity?